The process used to restore information from backup tapes is
corrupted or misused to the attackers advantage. Examples include the
creation of fake backups containing false information, alteration of tape
head alignments so that restoration fails, and the use of privileged
restoration programs to grant privilege by restoring protection settings or
ownerships to the wrong information.
Complexity: Creating fake backups may
be complicated by having to reproduce much of what is present on actual
backups on the particular site, by having to create CRC codes for replaced
components of a backup and by having to recreate an overall CRC code for the
entire backup when altering only one component. None of these operations
are very complex and all can be accomplished with near-linear time and space
techniques.
fc@red.a.net